Chapter 1 Flashcards

1
Q

Use Case

A

Describes a goal than an organization wants to achieve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Actors

A

A person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Precondition

A

Must occur before the process can start

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trigger

A

Starts the use case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Postcondition

A

Occurs after the actor triggers the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Normal Flow

A

Lists each step in specific order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidentiality

A

Prevents the unauthorized disclosure of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption

A

Scrambles data to make it unreadable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PII

A

Personally Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access Controls

A

Identification, authentication, and authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identification

A

User claimed identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication

A

Users prove their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authorization

A

Grant or restrict access to resources after authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Steganography

A

Hiding data within data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Obfuscation

A

METHOD to attempt to make something unclear or difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Integrity

A

Provides assurances that data has not changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Hashing

A

A number created by an algorithm against data to ensure integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hashing Algorithms

A

Message Digest 5 (MD5), Secure Hash Algorithm (SHA), and Hash-based Message Authentication Code (HMAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

MAC (NIC)

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

MAC (Mandatory)

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

MAC (Message)

A

Message authentication code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Digital Signature

A

Provides authentication and non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Non-repudiation

A

Verifies the user. Non-deniable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Availability

A

Indicates that data and services are available when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Redundancy

A

Adds duplication to critical systems and provide fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Fault Tolorance

A

Allows services to continue without interruption in the case of a fault.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Disk redundancies

A

Fault-tolerant disks, such as RAID-1, RAID-5, and RAID-10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Server redundancies

A

Failover clusters ensure a service will continue to operate, even if a server fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Load balancing

A

Uses multiple servers to support a single service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Site redundancies

A

If a site can no longer function due to a disaster, such as a fire, flood, hurricane, or earthquake, the organization can move critical systems to an alternate site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Risk

A

is the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Threat

A

any circumstance or event that has the potential to compromise confidentiality, integrity, or availability.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Vulnerability

A

is a weakness.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Security Incident

A

an adverse event or series of events that can negatively affect the confidentiality, integrity, or availability of an organization’s information technology (IT) systems and data.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Risk mitigation

A

Reduces the changes that a threat will exploit a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Control Types

A

Technical controls, Administrative controls, Phycial controls, Preventive controls, Detective controls, Corrective controls, Deterrent controls, Compensating controls.

37
Q

Administrative Controls

A

use administrative or management methods.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

38
Q

Physical Controls

A

refer to controls you can physically touch.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

39
Q

Preventive Controls

A

attempt to prevent an incident from occurring.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

40
Q

Detective controls

A

attempt to detect incidents after they have occurred.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

41
Q

Corrective Controls

A

attempt to reverse the impact of an incident.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

42
Q

Deterrent Controls

A

attempt to discourage individuals from causing an incident.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

43
Q

Compensating Controls

A

alternative controls used when a primary control is not feasible.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

44
Q

How Security Controls Are Implemented

A

Technical, Administrative, Physical.

45
Q

Goals of security controls

A

Preventive, Detective, Corrective, Deterrent, Compensating.

46
Q

IDSs

A

Intrusion detection system

47
Q

IPSs

A

Intrusion prevention system

48
Q

IDSs and IPSs Function

A

monitor a network or host for intrusions and provide ongoing protection against various threats.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

49
Q

Firewall

A

Restrict network traffic going in and out of a network.

50
Q

Least Priviledge

A

that individuals or processes are granted only the privileges they need to perform their assigned tasks or functions, but no more.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

51
Q

Risk Assessments

A

quantify and qualify risks within an organization so that the organization can focus on the serious risks.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

52
Q

Vulnerability Assessments

A

attempts to discover current vulnerabilities or weaknesses. When necessary, an organization implements additional controls to reduce the risk from these vulnerabilities.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

53
Q

Penetration Tests

A

attempting to exploit vulnerabilities.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

54
Q

NIST

A

National Institute of Standards and Technology

55
Q

Hardening

A

the practice of making a system or application more secure than its default configuration.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

56
Q

IPS Function

A

attempts to detect attacks and then modify the environment to block the attack from continuing.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

57
Q

TOTP

A

Time-based One-Time Password

58
Q

Virtualiztion

A

allows you to host one or more virtual systems, or virtual machines (VMs), on a single physical system.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

59
Q

Hypervisor

A

software that creates, runs, and manages the VMs

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

60
Q

Type I Hypervisor

A

run directly on the system hardware.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

61
Q

Type II Hypervisor

A

run as software within a host operating system.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

62
Q

Application Cell

A

virtualization or container virtualization runs services or applications within isolated application cells (or containers).

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

63
Q

VDI

A

Virtual Desktop Infrasctructure

64
Q

VDE

A

Virtual Desktop Environment

65
Q

VM Escape

A

an attack that allows an attacker to access the host system from within the virtual system.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

66
Q

VM Sprawl

A

sprawl occurs when an organization has many VMs that aren’t managed properly.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

67
Q

Kali Linux

A

a free Linux distribution used by many security professionals for penetration testing and security auditing.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

68
Q

Hyper-V

A

Windows VM Support

69
Q

VMware Workstation Player

A

Free VM software

70
Q

Oracle VMVirtualBox

A

Oracle VM software

71
Q

Ping

A

a basic command used to test connectivity for remote systems.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

72
Q

ipconfig

A

shows the Transmission Control Protocol/Internet Protocol (TCP/IP) configuration information for a system.

Entered by itself, the command provides basic information about the NIC, such as the IP address, subnet mask, and default gateway.

73
Q

ipconfig /all

A

This command shows a comprehensive listing of TCP/IP configuration information for each NIC.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

74
Q

ipconfig /displaydns

A

this command shows the contents of the DNS cache.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

75
Q

ipconfig /flushdns

A

erase the contents of the DNS cache with this command.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

76
Q

ifconfig

A

Linux command similar to ipconfig.

77
Q

ifconfig eth0

A

This command shows the configuration of the first Ethernet interface (NIC) on a Linux system.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

78
Q

ifconfig eth0 promisc

A

This command enables promiscuous mode on the first Ethernet interface.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

79
Q

ifconfig eth0 allmulti

A

This command enables multicast mode on the NIC.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

80
Q

netstat

A

allows you to view statistics for TCP/IP protocols on a system.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

81
Q

ESTABLISHED

A

The normal state for the data transfer phase of a connection.

82
Q

LISTEN

A

Indicates the system is waiting for a connection request.

83
Q

CLOSE_WAIT

A

This indicates the system is waiting for a connection termination request.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

84
Q

TIME_WAIT

A

This indicates the system is waiting for enough time to pass to be sure the remote system received a TCP-based acknowledgment of the connection.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

85
Q

SYN_SENT

A

This indicates the system sent a TCP SYN (synchronize) packet as the first part of the SYN, SYN-ACK (synchronize-acknowledge), ACK (acknowledge) handshake process and it is waiting for the SYN-ACK response.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

86
Q

SYN_RECEIVED

A

This indicates the system sent a TCP SYN-ACK packet after receiving a SYN packet as the first part of the SYN, SYN-ACK, ACK handshake process.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

87
Q

tracert

A

command lists the routers between two systems.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.

88
Q

arp

A

a command-line tool that is related to the Address Resolution Protocol (ARP)

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide . Kindle Edition.